Respuesta :
The answer is "conduct a penetration test".
A penetration test, informally known as a pen test, is an approved simulated assault on a PC framework, performed to assess the security of the framework. The test is performed to recognize the two shortcomings, including the potential for unauthorized parties to access the framework's features and information, and additionally its strength, empowering a full risk assessment to be done.
The correct answer is (c).
The company EIO wants you and your team to check the security of the network by simulating an attack by malicious individuals. He should conduct a penetration test.
Further Explanation:
Penetration test:
The penetration test is also known as pen test or an ethical hacking. It is an authorized simulated cyber-attack for computer systems. It is used for evaluating the security of the system.
Justification for the correct and incorrect answer:
a.
Do something illegal: This option is incorrect.
Doing something illegal is against the laws and the regulations. For checking the security of the network in a system a penetration test can be conducted for evaluating the security of the system.
b.
Conduct a vulnerability assessment: This option is incorrect.
The penetration test is conducted for checking the security of the system, not the vulnerability assessment.
c.
Conduct a penetration test: This option is correct.
The penetration test is conducted for checking the security of the system.
d.
Perform a risk assessment: This option is incorrect.
The penetration test is conducted for checking the security of the system, not a risk assessment.
Therefore, to check the security of the network in a system can be done by conducting a penetration test.
Learn More:
1. Computers and Technology
https://brainly.com/question/1840945
2. Computers and Technology
https://brainly.com/question/1359104
3. Computers and Technology
https://brainly.com/question/3207611
Answer Details:
Grade: High school
Chapter: Computer and technology security
Subject: Computer and technology
Keywords:
The Company EIO wants you and your team to check the security of the network by simulating an attack by malicious individuals, he is asking you to select one, do something illegal, conduct a vulnerability assessment, conduct a penetration test, and perform a risk assessment.